Understand the Importance of Verifying Transactions Amid Security Threats

By Patricia Miller

Sep 08, 2025

2 min read

Ledger's CTO warns of a large-scale supply chain attack affecting crypto transactions; users must verify their activities to stay safe.

What Should Hardware Wallet Users Know About Recent Security Risks?

Hardware wallet users should be aware of the urgent recommendations from Ledger's Chief Technology Officer following a significant security breach. The NPM account of a well-known developer was compromised, resulting in a widespread supply chain attack that affects a broad range of users across the software development landscape. This particular incident has raised critical alarms because the compromised packages have been downloaded over one billion times, posing a risk to the entire JavaScript ecosystem.

In light of this threat, users of hardware wallets are strongly urged to meticulously verify every transaction before signing. By ensuring every transaction is checked, hardware wallet users can protect themselves from the malicious code that swaps cryptocurrency addresses and facilitates theft. The situation can seem daunting, but as long as users remain vigilant and follow best practices, they can maintain a safe operating environment.

How Can Software Wallet Users Protect Themselves?

Software wallet users face a heightened level of risk during this crisis. It is advisable for these users to avoid onchain transactions until the security situation clarifies. The ongoing attack means that malicious code continues to spread through various platforms, exacerbating vulnerabilities in software wallets. Analysts recommend taking extra precautions by minimizing transaction activity during this volatile period.

According to a report from Substack, the compromised account’s author is collaborating with the NPM security team to address the issue, with efforts already underway to remove much of the malicious code. However, until the full scope of the fallout is understood, users of software wallets must exercise caution and employ preventive measures to ensure their digital assets remain secure.

Through informed vigilance and prompt actions, users can navigate this complex landscape and protect their investments against evolving cyber threats.

Important Notice And Disclaimer

This article does not provide any financial advice and is not a recommendation to deal in any securities or product. Investments may fall in value and an investor may lose some or all of their investment. Past performance is not an indicator of future performance.